input stringlengths 39 228 | output stringlengths 32 324 |
|---|---|
What is this exploit about: Sony Playstation 4 (PS4) 5.1 - Kernel (PoC) | This is a local exploit for hardware platform. Description: Sony Playstation 4 (PS4) 5.1 - Kernel (PoC). Author: qwertyoruiop |
Analyze the security implications of: Sony Playstation 4 (PS4) 5.1 - Kernel (PoC) | This exploit targets hardware systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Yelp 2.23.1 - Invalid URI Format String | This is a dos exploit for linux platform. Description: Yelp 2.23.1 - Invalid URI Format String. Author: Aaron Grattafiori |
Analyze the security implications of: Yelp 2.23.1 - Invalid URI Format String | This exploit targets linux systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Apple Safari 10.0.3(12602.4.8) / WebKit - 'HTMLObjectElement::updateWidget' Universal Cross-Site Scripting | This is a webapps exploit for multiple platform. Description: Apple Safari 10.0.3(12602.4.8) / WebKit - 'HTMLObjectElement::updateWidget' Universal Cross-Site Scripting. Author: Google Security Research |
Analyze the security implications of: Apple Safari 10.0.3(12602.4.8) / WebKit - 'HTMLObjectElement::updateWidget' Universal Cross-Site Scripting | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: 6kbbs - Multiple Vulnerabilities | This is a webapps exploit for php platform. Description: 6kbbs - Multiple Vulnerabilities. Author: labs insight |
Analyze the security implications of: 6kbbs - Multiple Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: LibreNMS - addhost Command Injection (Metasploit) | This is a remote exploit for linux platform. Description: LibreNMS - addhost Command Injection (Metasploit). Author: Metasploit |
Analyze the security implications of: LibreNMS - addhost Command Injection (Metasploit) | This exploit targets linux systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Lama Software 14.12.2007 - Multiple Remote File Inclusions | This is a webapps exploit for php platform. Description: Lama Software 14.12.2007 - Multiple Remote File Inclusions. Author: QTRinux |
Analyze the security implications of: Lama Software 14.12.2007 - Multiple Remote File Inclusions | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Hasura GraphQL 2.2.0 - Information Disclosure | This is a webapps exploit for multiple platform. Description: Hasura GraphQL 2.2.0 - Information Disclosure. Author: Dolev Farhi |
Analyze the security implications of: Hasura GraphQL 2.2.0 - Information Disclosure | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: RedHat Linux 5.0/5.1/5.2 / Slackware Linux 3.5 - 'klogd' Local Buffer Overflow (1) | This is a local exploit for linux platform. Description: RedHat Linux 5.0/5.1/5.2 / Slackware Linux 3.5 - 'klogd' Local Buffer Overflow (1). Author: Michal Zalewski |
Analyze the security implications of: RedHat Linux 5.0/5.1/5.2 / Slackware Linux 3.5 - 'klogd' Local Buffer Overflow (1) | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: GEDCOM_TO_MYSQL - '/PHP/prenom.php' Multiple Cross-Site Scripting Vulnerabilities | This is a webapps exploit for php platform. Description: GEDCOM_TO_MYSQL - '/PHP/prenom.php' Multiple Cross-Site Scripting Vulnerabilities. Author: ZoRLu |
Analyze the security implications of: GEDCOM_TO_MYSQL - '/PHP/prenom.php' Multiple Cross-Site Scripting Vulnerabilities | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: CeleronDude Uploader 6.1 - 'account.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: CeleronDude Uploader 6.1 - 'account.php' Cross-Site Scripting. Author: Xc0re |
Analyze the security implications of: CeleronDude Uploader 6.1 - 'account.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: DropTeam 1.3.3 - Multiple Remote Vulnerabilities | This is a remote exploit for multiple platform. Description: DropTeam 1.3.3 - Multiple Remote Vulnerabilities. Author: Luigi Auriemma |
Analyze the security implications of: DropTeam 1.3.3 - Multiple Remote Vulnerabilities | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Mambo Component nfnaddressbook 0.4 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Mambo Component nfnaddressbook 0.4 - Remote File Inclusion. Author: Cold Zero |
Analyze the security implications of: Mambo Component nfnaddressbook 0.4 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Lc Flickr Carousel 1.0 - Local File Disclosure | This is a webapps exploit for php platform. Description: Lc Flickr Carousel 1.0 - Local File Disclosure. Author: GoLd_M |
Analyze the security implications of: Lc Flickr Carousel 1.0 - Local File Disclosure | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: D-Link DIR-605L < 2.08 - Denial of Service | This is a dos exploit for hardware platform. Description: D-Link DIR-605L < 2.08 - Denial of Service. Author: Enrique Castillo |
Analyze the security implications of: D-Link DIR-605L < 2.08 - Denial of Service | This exploit targets hardware systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: FLV Players 8 - 'popup.php?url' Cross-Site Scripting | This is a remote exploit for multiple platform. Description: FLV Players 8 - 'popup.php?url' Cross-Site Scripting. Author: xzerox |
Analyze the security implications of: FLV Players 8 - 'popup.php?url' Cross-Site Scripting | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: CyberArk Password Vault Web Access < 9.9.5 / < 9.10 / 10.1 - Remote Code Execution | This is a webapps exploit for json platform. Description: CyberArk Password Vault Web Access < 9.9.5 / < 9.10 / 10.1 - Remote Code Execution. Author: RedTeam Pentesting |
Analyze the security implications of: CyberArk Password Vault Web Access < 9.9.5 / < 9.10 / 10.1 - Remote Code Execution | This exploit targets json systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets json platform |
What is this exploit about: Lyrist - 'id' SQL Injection | This is a webapps exploit for php platform. Description: Lyrist - 'id' SQL Injection. Author: Meisam Monsef |
Analyze the security implications of: Lyrist - 'id' SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: PHP 5.5.33/7.0.4 - SNMP Format String | This is a remote exploit for multiple platform. Description: PHP 5.5.33/7.0.4 - SNMP Format String. Author: Andrew Kramer |
Analyze the security implications of: PHP 5.5.33/7.0.4 - SNMP Format String | This exploit targets multiple systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Hobosworld HobSR - Multiple SQL Injections | This is a webapps exploit for php platform. Description: Hobosworld HobSR - Multiple SQL Injections. Author: r0t3d3Vil |
Analyze the security implications of: Hobosworld HobSR - Multiple SQL Injections | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Texas Instrument Emulator 3.03 - Local Buffer Overflow | This is a local exploit for linux platform. Description: Texas Instrument Emulator 3.03 - Local Buffer Overflow. Author: Juan Sacco |
Analyze the security implications of: Texas Instrument Emulator 3.03 - Local Buffer Overflow | This exploit targets linux systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets linux platform |
What is this exploit about: Mayasan Portal 2.0 - 'haberdetay.asp' SQL Injection | This is a webapps exploit for asp platform. Description: Mayasan Portal 2.0 - 'haberdetay.asp' SQL Injection. Author: CoBRa_21 |
Analyze the security implications of: Mayasan Portal 2.0 - 'haberdetay.asp' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Live For Speed S1/S2 - Multiple Vulnerabilities | This is a dos exploit for multiple platform. Description: Live For Speed S1/S2 - Multiple Vulnerabilities. Author: Luigi Auriemma |
Analyze the security implications of: Live For Speed S1/S2 - Multiple Vulnerabilities | This exploit targets multiple systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Enomaly ECP / Enomalism < 2.2.1 - Multiple Local Vulnerabilities | This is a local exploit for multiple platform. Description: Enomaly ECP / Enomalism < 2.2.1 - Multiple Local Vulnerabilities. Author: Sam Johnston |
Analyze the security implications of: Enomaly ECP / Enomalism < 2.2.1 - Multiple Local Vulnerabilities | This exploit targets multiple systems. Type: local. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: Fortigate Firewalls - Cross-Site Request Forgery | This is a webapps exploit for hardware platform. Description: Fortigate Firewalls - Cross-Site Request Forgery. Author: Sven Wurth |
Analyze the security implications of: Fortigate Firewalls - Cross-Site Request Forgery | This exploit targets hardware systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets hardware platform |
What is this exploit about: Joomla! Component flash fun! 1.0 - Remote File Inclusion | This is a webapps exploit for php platform. Description: Joomla! Component flash fun! 1.0 - Remote File Inclusion. Author: Morgan |
Analyze the security implications of: Joomla! Component flash fun! 1.0 - Remote File Inclusion | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: WordPress Plugin InfusionSoft - Arbitrary File Upload (Metasploit) | This is a remote exploit for php platform. Description: WordPress Plugin InfusionSoft - Arbitrary File Upload (Metasploit). Author: Metasploit |
Analyze the security implications of: WordPress Plugin InfusionSoft - Arbitrary File Upload (Metasploit) | This exploit targets php systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Blog Torrent 0.80 - 'BTDownload.php' Cross-Site Scripting | This is a webapps exploit for php platform. Description: Blog Torrent 0.80 - 'BTDownload.php' Cross-Site Scripting. Author: Lostmon |
Analyze the security implications of: Blog Torrent 0.80 - 'BTDownload.php' Cross-Site Scripting | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Zendesk App SweetHawk Survey 1.6 - Persistent Cross-Site Scripting | This is a webapps exploit for java platform. Description: Zendesk App SweetHawk Survey 1.6 - Persistent Cross-Site Scripting. Author: MTK |
Analyze the security implications of: Zendesk App SweetHawk Survey 1.6 - Persistent Cross-Site Scripting | This exploit targets java systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets java platform |
What is this exploit about: Ocean12 Technologies Calendar Manager Pro 1.0 1 - '/admin/edit.asp?ID' SQL Injection | This is a webapps exploit for asp platform. Description: Ocean12 Technologies Calendar Manager Pro 1.0 1 - '/admin/edit.asp?ID' SQL Injection. Author: dj_eyes2005 |
Analyze the security implications of: Ocean12 Technologies Calendar Manager Pro 1.0 1 - '/admin/edit.asp?ID' SQL Injection | This exploit targets asp systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets asp platform |
What is this exploit about: Apple macOS XNU Kernel - Memory Disclosure due to bug in Kernel API for Detecting Kernel Memory Disclosures | This is a dos exploit for macos platform. Description: Apple macOS XNU Kernel - Memory Disclosure due to bug in Kernel API for Detecting Kernel Memory Disclosures. Author: Google Security Research |
Analyze the security implications of: Apple macOS XNU Kernel - Memory Disclosure due to bug in Kernel API for Detecting Kernel Memory Disclosures | This exploit targets macos systems. Type: dos. Risk level: Medium |
What platform does this exploit target? | This exploit targets macos platform |
What is this exploit about: Novell Netware Enterprise Web Server 5.1/6.0 - snoop.jsp Information Disclosure | This is a remote exploit for netware platform. Description: Novell Netware Enterprise Web Server 5.1/6.0 - snoop.jsp Information Disclosure. Author: Rafel Ivgi The-Insider |
Analyze the security implications of: Novell Netware Enterprise Web Server 5.1/6.0 - snoop.jsp Information Disclosure | This exploit targets netware systems. Type: remote. Risk level: High |
What platform does this exploit target? | This exploit targets netware platform |
What is this exploit about: Jara 1.6 - SQL Injection | This is a webapps exploit for php platform. Description: Jara 1.6 - SQL Injection. Author: muuratsalo |
Analyze the security implications of: Jara 1.6 - SQL Injection | This exploit targets php systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets php platform |
What is this exploit about: Codiad 2.8.4 - Remote Code Execution (Authenticated) | This is a webapps exploit for multiple platform. Description: Codiad 2.8.4 - Remote Code Execution (Authenticated). Author: WangYihang |
Analyze the security implications of: Codiad 2.8.4 - Remote Code Execution (Authenticated) | This exploit targets multiple systems. Type: webapps. Risk level: Medium |
What platform does this exploit target? | This exploit targets multiple platform |
What is this exploit about: lighttpd 1.4.31 - Denial of Service (PoC) | This is a dos exploit for linux platform. Description: lighttpd 1.4.31 - Denial of Service (PoC). Author: t4c |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.